메뉴 건너뛰기




Volumn 76, Issue , 2017, Pages 540-549

Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation

Author keywords

Internet of Things; IoT privacy and security; Secure IoT platform

Indexed keywords

ARCHITECTURE; DATA PRIVACY; WEB CRAWLER;

EID: 85016435659     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2017.03.001     Document Type: Article
Times cited : (114)

References (44)
  • 1
    • 85026467469 scopus 로고    scopus 로고
    • Gartner, accessed: 2016-03-7. [link]. URL.
    • Gartner, accessed: 2016-03-7. [link]. URL http://www.gartner.com/newsroom/id/3165317.
  • 2
    • 84981285674 scopus 로고    scopus 로고
    • Internet of things: from Internet scale sensing to smart services
    • Georgakopoulos, D., Jayaraman, P.P., Internet of things: from Internet scale sensing to smart services. Computing 98:10 (2016), 1041–1058.
    • (2016) Computing , vol.98 , Issue.10 , pp. 1041-1058
    • Georgakopoulos, D.1    Jayaraman, P.P.2
  • 3
    • 84861997111 scopus 로고    scopus 로고
    • Internet of things: Vision, applications and research challenges
    • Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I., Internet of things: Vision, applications and research challenges. Ad Hoc Networks 10:7 (2012), 1497–1516.
    • (2012) Ad Hoc Networks , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 7
    • 85026441587 scopus 로고    scopus 로고
    • Privacy and security in the Internet of things: challenge or opportunity, accessed: 2016-03-7. URL.
    • B. Escribano, Privacy and security in the Internet of things: challenge or opportunity, accessed: 2016-03-7. URL http://www.olswang.com/articles/2014/11/privacy-and-security-in-the-internet-of-things-challenge-or-opportunity.
    • Escribano, B.1
  • 8
    • 84879243749 scopus 로고    scopus 로고
    • Cyber-physical-social based security architecture for future Internet of things
    • Huansheng Ning, H.L., Cyber-physical-social based security architecture for future Internet of things. Adv. Internet Things 2:1 (2012), 1–7.
    • (2012) Adv. Internet Things , vol.2 , Issue.1 , pp. 1-7
    • Huansheng Ning, H.L.1
  • 10
    • 85018406878 scopus 로고    scopus 로고
    • Data exfiltration from Internet of things devices: ios devices as case studies
    • 1–1.
    • DOrazio, C.J., Choo, K.K.R., Yang, L.T., Data exfiltration from Internet of things devices: ios devices as case studies. IEEE Internet Things J., PP(99), 2016 1–1. http://dx.doi.org/10.1109/JIOT.2016.2569094.
    • (2016) IEEE Internet Things J. , vol.PP , Issue.99
    • DOrazio, C.J.1    Choo, K.K.R.2    Yang, L.T.3
  • 11
    • 84942465510 scopus 로고    scopus 로고
    • A cloud-focused mobile forensics methodology
    • Do, Q., Martini, B., Choo, K.K.R., A cloud-focused mobile forensics methodology. IEEE Cloud Comput. 2:4 (2015), 60–65.
    • (2015) IEEE Cloud Comput. , vol.2 , Issue.4 , pp. 60-65
    • Do, Q.1    Martini, B.2    Choo, K.K.R.3
  • 12
    • 84959862120 scopus 로고    scopus 로고
    • Secure authentication scheme for iot and cloud servers
    • Kalra, S., Sood, S.K., Secure authentication scheme for iot and cloud servers. Pervasive Mob. Comput. 24 (2015), 210–223.
    • (2015) Pervasive Mob. Comput. , vol.24 , pp. 210-223
    • Kalra, S.1    Sood, S.K.2
  • 14
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Neuman, B.C., Ts’~O, T., Kerberos: An authentication service for computer networks. IEEE Commun. Mag. 32:9 (1994), 33–38.
    • (1994) IEEE Commun. Mag. , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts’~O, T.2
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21:2 (1978), 120–126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 18
    • 79955712919 scopus 로고    scopus 로고
    • Key management systems for sensor networks in the context of the Internet of things
    • Roman, R., Alcaraz, C., Lopez, J., Sklavos, N., Key management systems for sensor networks in the context of the Internet of things. Comput. Electr. Eng. 37:2 (2011), 147–159.
    • (2011) Comput. Electr. Eng. , vol.37 , Issue.2 , pp. 147-159
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3    Sklavos, N.4
  • 19
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key pre-distribution scheme for wireless sensor networks
    • W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, 2003, pp. 42–51.
    • (2003) , pp. 42-51
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 20
    • 35048867517 scopus 로고    scopus 로고
    • Combinatorial design of key distribution mechanisms for wireless sensor networks
    • Springer
    • Camtepe, S.A., Yener, B., Combinatorial design of key distribution mechanisms for wireless sensor networks. Computer Security, ESORICS 04, 2004, Springer, 293–308.
    • (2004) Computer Security, ESORICS 04 , pp. 293-308
    • Camtepe, S.A.1    Yener, B.2
  • 27
    • 79952071204 scopus 로고    scopus 로고
    • Fdac: Toward fine-grained distributed data access control in wireless sensor networks
    • Yu, S., Ren, K., Lou, W., Fdac: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22:4 (2011), 673–686.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.4 , pp. 673-686
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 28
    • 84914669929 scopus 로고    scopus 로고
    • Secure publish-subscribe protocols for heterogeneous medical wireless body area networks
    • Picazo-Sanchez, P., Tapiador, J.E., Peris-Lopez, P., Suarez-Tangil, G., Secure publish-subscribe protocols for heterogeneous medical wireless body area networks. Sensors 14:12 (2014), 22619–22642.
    • (2014) Sensors , vol.14 , Issue.12 , pp. 22619-22642
    • Picazo-Sanchez, P.1    Tapiador, J.E.2    Peris-Lopez, P.3    Suarez-Tangil, G.4
  • 29
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Springer
    • Boneh, D., Franklin, M., Identity-based encryption from the weil pairing. Advances in Cryptology, CRYPTO 2001, 2001, Springer, 213–229.
    • (2001) Advances in Cryptology, CRYPTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 31
    • 84876964561 scopus 로고    scopus 로고
    • Internet of things’ authentication and access control
    • Liu, J., Xiao, Y., Chen, C.P., Internet of things’ authentication and access control. Int. J. Secur. Netw. 7:4 (2012), 228–241.
    • (2012) Int. J. Secur. Netw. , vol.7 , Issue.4 , pp. 228-241
    • Liu, J.1    Xiao, Y.2    Chen, C.P.3
  • 33
    • 85026433746 scopus 로고    scopus 로고
    • Alarm-net: Wireless sensor networks for assisted-living and residential monitoring, University of Virginia Computer Science Department Technical Report 2.
    • A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, J. Stankovic, Alarm-net: Wireless sensor networks for assisted-living and residential monitoring, University of Virginia Computer Science Department Technical Report 2.
    • Wood, A.1    Virone, G.2    Doan, T.3    Cao, Q.4    Selavo, L.5    Wu, Y.6    Fang, L.7    He, Z.8    Lin, S.9    Stankovic, J.10
  • 36
    • 84939126096 scopus 로고    scopus 로고
    • Privacy in Internet of things: A model and protection framework
    • Samani, A., Ghenniwa, H.H., Wahaishi, A., Privacy in Internet of things: A model and protection framework. Procedia Comput. Sci. 52 (2015), 606–613.
    • (2015) Procedia Comput. Sci. , vol.52 , pp. 606-613
    • Samani, A.1    Ghenniwa, H.H.2    Wahaishi, A.3
  • 39
    • 84963728330 scopus 로고    scopus 로고
    • Forensic-by-design framework for cyber-physical cloud systems
    • Rahman, N.H.A., Glisson, W.B., Yang, Y., Choo, K.K.R., Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Comput. 3:1 (2016), 50–59.
    • (2016) IEEE Cloud Comput. , vol.3 , Issue.1 , pp. 50-59
    • Rahman, N.H.A.1    Glisson, W.B.2    Yang, Y.3    Choo, K.K.R.4
  • 40
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • Springer Berlin, Heidelberg Berlin, Heidelberg
    • Paillier, P., Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. 1999, Springer Berlin, Heidelberg, Berlin, Heidelberg, 223–238.
    • (1999) , pp. 223-238
    • Paillier, P.1
  • 43
    • 85026486573 scopus 로고    scopus 로고
    • The oauth 2.0 authorization framework, accessed: 2016-03-11. URL.
    • D. Hardt, The oauth 2.0 authorization framework, accessed: 2016-03-11. URL https://tools.ietf.org/html/rfc6749.
    • Hardt, D.1
  • 44
    • 85026479262 scopus 로고    scopus 로고
    • Amazon, Amazon elastic compute cloud (amazon ec2)Accessed: 2016-03-7. URL.
    • Amazon, Amazon elastic compute cloud (amazon ec2)Accessed: 2016-03-7. URL https://aws.amazon.com/ec2.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.